third-party

By George V. Hulme, CSO | July 28th, 2014 It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and

By Agam Shah, IDG News Service | July 24th, 2014 Servers, chips and components are under development as part of third-party licensing deals. The first third-party chips and servers licensed to use IBM’s Power architecture will be on the market

Donate

Like most websites GIXtools uses cookies. In order to deliver a personalised, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. These cookies are completely safe and secure and will never contain any sensitive information. Accept